Singapore Management University

Displaying 1-6 of 6 results

  • White Papers // Nov 2010

    A Review of the Professionalization of the Software Industry: Has it Made Software Engineering a Real Profession?

    Every industry strives to be called a "Profession", and software engineering is no exception. This paper attempts to define "Profession" from three different perspectives and provides a chronological narration of the professionalization efforts of major IT bodies such as the IEEE Computer Society, Association of Computing Machinery and British Computer...

    Provided By Singapore Management University

  • White Papers // May 2010

    Fighting Coercion Attacks in Key Generation using Skin Conductance

    Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt...

    Provided By Singapore Management University

  • White Papers // Jan 2010

    Practical ID-Based Encryption for Wireless Sensor Network

    In this paper, the authors propose a new practical identity-based encryption scheme which is suitable for Wireless Sensor Network (WSN). The authors call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy...

    Provided By Singapore Management University

  • White Papers // Jan 2010

    On the Potential of Limitation-Oriented Malware Detection and Prevention Techniques on Mobile Phones

    The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding...

    Provided By Singapore Management University

  • White Papers // Aug 2009

    Essential Spreadsheet Modeling Course for Business Students

    Learning the art of modeling constitutes more than exposure to models and computing solutions. The latter has evidently been the primary approach so far. Modeling is really about dealing with open-ended questions, navigating around assumption and trying to make some sense of the situation. It must explore unspoken possibilities and...

    Provided By Singapore Management University

  • White Papers // Apr 2009

    Conditional Proxy Broadcast Re-Encryption

    A Proxy RE-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts de-cryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, the authors introduce a more generalized notion of Conditional Proxy Broadcast RE-encryption (CPBRE). A...

    Provided By Singapore Management University

  • White Papers // Aug 2009

    Essential Spreadsheet Modeling Course for Business Students

    Learning the art of modeling constitutes more than exposure to models and computing solutions. The latter has evidently been the primary approach so far. Modeling is really about dealing with open-ended questions, navigating around assumption and trying to make some sense of the situation. It must explore unspoken possibilities and...

    Provided By Singapore Management University

  • White Papers // Jan 2010

    On the Potential of Limitation-Oriented Malware Detection and Prevention Techniques on Mobile Phones

    The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding...

    Provided By Singapore Management University

  • White Papers // Jan 2010

    Practical ID-Based Encryption for Wireless Sensor Network

    In this paper, the authors propose a new practical identity-based encryption scheme which is suitable for Wireless Sensor Network (WSN). The authors call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy...

    Provided By Singapore Management University

  • White Papers // May 2010

    Fighting Coercion Attacks in Key Generation using Skin Conductance

    Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt...

    Provided By Singapore Management University

  • White Papers // Nov 2010

    A Review of the Professionalization of the Software Industry: Has it Made Software Engineering a Real Profession?

    Every industry strives to be called a "Profession", and software engineering is no exception. This paper attempts to define "Profession" from three different perspectives and provides a chronological narration of the professionalization efforts of major IT bodies such as the IEEE Computer Society, Association of Computing Machinery and British Computer...

    Provided By Singapore Management University

  • White Papers // Apr 2009

    Conditional Proxy Broadcast Re-Encryption

    A Proxy RE-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts de-cryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, the authors introduce a more generalized notion of Conditional Proxy Broadcast RE-encryption (CPBRE). A...

    Provided By Singapore Management University